this post was submitted on 12 Aug 2025
21 points (100.0% liked)
Privacy
7204 readers
6 users here now
A community for Lemmy users interested in privacy
Rules:
- Be civil
- No spam posting
- Keep posts on-topic
- No trolling
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
No problem!
I completely know what you mean, it took a lot of research before I felt comfortable enough trusting a public instance enough to use.
So that solution would still decrease their ability to fingerprint you by a lot, but really the big problem would all the people/scripts randomly hammering your ip. They wouldn't get past your password. But it being public and discoverable would meant you'd constantly be getting hit with a bunch of automation scanning your ports. And the security risk isn't the concern, it's more the heavy traffic slowing down your connect from them. It sounds like you'd be fine from a security stand point. But you'd have to put up something to block the traffic.
You could always self host, use that when you're at home or connected to home through VPN and use it for more personal searches, and then use public instances when you're connected to other vpns for more general or vague searches. Mixing and matching like that will at least add some noise and make you less identifiable. Kind of best of both worlds.
As a semi-simple compromise it would be cool if there was some way to have the cycling between different Searx instances be done automatically. E.g. either as a browser feature/browser extension, or as some private self-hosted interface to which I send my requests and which then selects the server at random from some subset of the list on searx.space. Or, while a bit hacky, the easiest way could be to do this on the DNS level. Should be doable with just one or two existing tools, with standard tools even.